password digital password: digital · encryption, password and digital, can help secure your pdfs....

1
PDFs beat almost every other kind of document when it comes to security. But which methods are available, and which ones should you integrate into your workflow? BEST WAYS TO SECURE YOUR Turn on TRUST MANAGER in your PDF reader to guard against malware from malicious PDF documents. Verifies the authenticity of the signee and the integrity of the signed document. PERMANENT REMOVAL of visible text and images. If you’ve ever read a government report, you’ve probably seen redaction in practice. Watermarks, headers and footers all indicate the LEVEL OF CONFIDENTIALITY a document should have. However, this method depends on people enforcing the security, as there’s no mechanism inside the document to prevent those who shouldn’t see it from being able to view it. Two main types of encryption, PASSWORD and DIGITAL, can help secure your PDFs. Enables CONTROL OF APPROVED DOCUMENTS, ensuring that certain changes will not be possible for the document to remain certified. For instance, if your marketing manager has signed off on the next quarter’s plan, you wouldn’t want someone changing a budget item, so document certification controls what types of changes can be made. TRUST MANAGER DIGITAL SIGNATURE This allows you to remove sensitive information from your document before publishing. DOCUMENT SANITIZATION REDACTION DOCUMENT CERTIFICATION WATERMARKS, HEADERS, FOOTERS ENCRYPTION Two main types of rights management, information rights management and digital rights management, can help keep your documents secure. RIGHTS MANAGEMENT of annualized costs from cybercrime were related to malicious code (1) 23% Online records exposed in 2013 (2) COMMON INFORMATION SUBJECT TO REDACTION: 740 million+ Global losses in 2013 due to phishing alone (5) $ 5.9 billion Social Security numbers Financial account numbers Home addresses Dates of birth Insurance coverage details Medical information PASSWORD: Access available via password only DIGITAL: Access determined by digital certificates INFORMATION RIGHTS MANAGEMENT (IRM): Typically within a company, this includes giving individuals specific rights, which can differ depending on the person. DIGITAL RIGHTS MANAGEMENT (DRM): Protects information after sale, most often consumer-facing, the biggest contemporary example of DRM in practice are paywalls. Encryption using passwords is by far the MOST COMMON, though it is generally less secure than digital certificates. That’s 14 ADULTS EVERY SECOND. (3) More than 1 MILLION people per day SUSTAIN CYBERATTACKS. 20,750 FOR EVERY INTERNET CRIME VICTIMS (4) 1 IDENTITY THIEF WAS CONVICTED 1 in 14 PROGRAMS is later confirmed as malware. (7) Americans who have had personal information stolen by hackers (6) 40 million per year (6) $ 445 billion CYBERCRIME costs the global economy about COMMON ITEMS REMOVED IN SANITIZATION: Metadata Hidden layers Hidden data from previous versions Comments Overlapping objects OF THE POPULATION. (6) 15% That’s about ADDITIONAL SOURCES 1. http://www.statista.com | 2. http://motherboard.vice.com | 3. http://www.microsoft.eu | 4. http://www.infoworld.com 5. http://www.emc.com | 6. http://www.reuters.com | 7. http://blogs.msdn.com =1 million

Upload: others

Post on 09-Oct-2020

11 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: PASSWORD DIGITAL PASSWORD: DIGITAL · encryption, PASSWORD and DIGITAL, can help secure your PDFs. Enables CONTROL OF APPROVED DOCUMENTS, ensuring that certain changes will not be

PDFs beat almost every other kind of document when it comes to security. But which methods are available, and which ones should you integrate into your work�ow?

BEST WAYS TO BEST WAYS TO SECUREYOURSECUREYOUR

Turn on TRUST MANAGER in your PDF reader to guard against malware from malicious PDF documents.

Veri�es the authenticity of the signee and the integrity of the signed document.

PERMANENT REMOVAL of visible text and images. If you’ve ever read a government report, you’ve probably seen redaction in practice.

Watermarks, headers and footers all indicate the LEVEL OF CONFIDENTIALITY a document should have. However, this method depends on people enforcing the security, as there’s no mechanism inside the document to prevent those who shouldn’t see it from being able to view it.

Two main types of encryption, PASSWORD and DIGITAL, can help secure your PDFs.

Enables CONTROL OF APPROVED DOCUMENTS, ensuring that certain changes will not be possible for the document to remain certi�ed. For instance, if your marketing manager has signed off on the next quarter’s plan, you wouldn’t want someone changing a budget item, so document certi�cation controls what types of changes can be made.

TRUST MANAGER

DIGITAL SIGNATURE

This allows you to remove sensitive information from your document before publishing.

DOCUMENT SANITIZATION

REDACTION

DOCUMENT CERTIFICATION

WATERMARKS, HEADERS, FOOTERS

ENCRYPTION

Two main types of rights management, information rights management and digital rights management, can help keep your documents secure.

RIGHTS MANAGEMENT

of annualized costs from cybercrime were related to malicious code (1)

23%23%

Online records exposed in 2013 (2)

COMMON INFORMATION SUBJECT TO REDACTION:

740million+740million+

Global losses in 2013 due to

phishing alone (5)

$5.9billion$5.9billion

Social Securitynumbers

Financialaccountnumbers

Homeaddresses

Datesof birth

Insurancecoveragedetails

Medicalinformation

PASSWORD:Access available via password only

DIGITAL: Access determined by digital certi�cates

INFORMATION RIGHTS MANAGEMENT (IRM):Typically within a company, this includes giving individuals speci�c rights, which can differ depending on the person.

DIGITAL RIGHTS MANAGEMENT (DRM): Protects information after sale, most often consumer-facing, the biggest contemporary example of DRM in practice are paywalls.

Encryption using passwords is by far the

MOST COMMON, though it is generally

less secure than digital certi�cates.

That’s

14 ADULTS14 ADULTSEVERY SECOND. (3)EVERY SECOND. (3)

More than 1 MILLION people per day SUSTAIN CYBERATTACKS.

20,75020,750FOR EVERY

INTERNET CRIMEVICTIMS (4)

11IDENTITYTHIEFTHIEFWAS CONVICTED

1 in 141 in 14PROGRAMSPROGRAMS

is later con�rmed as malware. (7)

Americans who have had personal information stolen by hackers (6)

40million40million

per year (6)

$445billion$445billion

CYBERCRIMEcosts the global economy about

COMMON ITEMS REMOVED IN SANITIZATION:

Metadata

Hidden layers

Hidden data from previous versions

Comments

Overlapping objects

OF THEPOPULATION. (6)

OF THEPOPULATION. (6)

15% 15%That’s about

ADDITIONAL SOURCES1. http://www.statista.com | 2. http://motherboard.vice.com | 3. http://www.microsoft.eu | 4. http://www.infoworld.com

5. http://www.emc.com | 6. http://www.reuters.com | 7. http://blogs.msdn.com

=1 million